New & Notable

News

Ransomware attacks caused prolonged disruptions in October

The Ransomhub, Rhysdia and Interlock ransomware gangs claimed responsibility for attacks that knocked victims' services offline, sometimes for several weeks.

Get Started

How to build a Python port scanner

Python offers beginning coders a lot of flexibility and is a novel way to build tools designed to probe port performance across your network.

News

CISA on 2024 election security: 'Good news' for democracy

CISA Director Jen Easterly says that despite disruptions including bomb threats in multiple states, Election Day 2024 was a success story from a security standpoint.

News

Canadian authorities arrest alleged Snowflake hacker

Alexander Moucka was arrested last week and is expected to appear in court Tuesday for allegedly breaching dozens of Snowflake customers.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    How to build a Python port scanner

    Python offers beginning coders a lot of flexibility and is a novel way to build tools designed to probe port performance across your network.

  • Get Started

    What is machine identity management?

    Machine identity management focuses on the machines connected to and accessing resources on a network.

  • Get Started

    What is unified threat management (UTM)?

    Unified threat management (UTM) is an information security system that provides a single point of protection against cyberthreats, including viruses, worms, spyware and other malware, as well as network attacks.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security